### Information flow complexity

Assignment Help Software Engineering
##### Reference no: EM133480

QUESTION 1

There are many of issues affecting cost of software. List and explain the five parts affecting pricing in software.

QUESTION 2

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
}return temp;
}

(a) Sketch a control flow graph for the above function.

(b) Figure out the Cyclomatic complexity based on your control flow graph.

(c) Using two other methods, show that the Cyclomatic complexity acquired in the above question is correct.

(d) List the set of independent trails from the graph.

QUESTION 3:

Suppose you work for a company that makes dwelling safety and security monitoring devices and controllers. Now your company desires to sell home safety systems. You are requested to plan and build the software part of the system. The obtainable components are:

• controller (with associated monitoring devices) for door and window alarms

• controller (with associated monitoring devices) for motion detectors

• controller (with associated monitoring devices) for panic buttons

• controller (with associated monitoring devices) for fire detector

• controller (with associated devices) for light activator and deactivator

• controller/monitor for key device (to turn system on and off)

• wireless dial-out device with controller

(b) Calculate approximately the effort (time taken) to build the system. Presume a productivity of 10FPs per staff month.

QUESTION 4

(a) Portray the types of metrics we have in software development.

(b) List four problems that project managers encounter before starting and during the course of expansion phase of a software project

QUESTION 5

void sort( int *a, int n )
{
int i, j, t;
if( n <2 ) return;
for( i=0 ; i <n-1; i++)
{
for( j=i+1 ; j <n ; j++)
{
if( a[i] > a[j])
{
t=a[i];
a[i] =a[j];
a[j]=t;
}
}
}
}

Concerning Halstead's metrics, calculate the following:

(a) volume

(b) difficulty

(c) effort

Note: Ignore function definition

QUESTION 6

A lot of software companies still make use of subjective estimation techniques while replying to Request for Proposals (RFPs). List and illustrate four common estimation models.

QUESTION 7

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
} return temp;
}

(a) Conclude the Information Flow Complexity.

(b) Compute the Weighted IFC.

QUESTION 8

Using the below stated quality requirement as reference, Give details of the Software Quality Metrics Framework.
Quality precondition: "The product will be easy to use".

#### Questions Cloud

 Sustainable community tourism : Tourism Area Life Cycle, Doxey's Irridex model, Social Exchange Theory, on-traditional rural expansion strategies, environmental management tools, environmental collisions of tourism Conserving biodiversity : legal framework to guard biodiversity, marine biosphere, Ex-situ conservation, marine biodiversity, conservation of biodiversity, International Conventions Ecosystem : preserve biodiversity, social, environmental and cost-effective perspective, in-situ conservation, ex- situ conservation, Invasive alien species, conservation education a significant tool for protecting biodiversity, marine biodiversity, Ecosystem Ba.. Energy transition : energy, poverty, agriculture, biodiversity, Energy Management, geothermal energy, use of E10 in petrol vehicles, use nuclear power to meet the electricity demand, sustainable energy Information flow complexity : Cyclomatic complexity, monitoring devices, wireless dial-out device with controller, Request for Proposals (RFPs), Weighted IFC Project management for engineering : economic feasibility of the projec, restrictions are the economics of the project based,  technical feasibility for the project Ip spoofing : honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer Protocol stack for wap2 : WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl.. Network threats : confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

### Write a Review

#### Development of a small software system

Analysis, design and development of a small software system.

#### Create a complete limited entry decision table

Create a complete limited entry decision table

#### Frame diagrams

Prepare a frame diagram for the software systems.

#### Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

#### Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

#### Describe purpose of the keyword super in programs

Describe purpose of the keyword super in programs

#### Star life cycle model

interface design proces, Star Life Cycle as a model for interface Design, Nielsen's usability principles, Shneiderman's eight golden rules

#### A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

#### Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

#### Systems analysis and design requirements

Systems Analysis and Design requirements

#### What is the standard error

If you have five critical errors, two main faults, and five minor errors, what is the standard error

#### Define the term software architecture

Define the term software architecture A service is a software component of distinctive functional meaning that typically encapsulates a high-level business concept, and is usually made up of three parts. Describe the three sub-components that m..